| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149 | 
							- /*
 
-  * Arcfour (RC4) implementation for PuTTY.
 
-  *
 
-  * Coded from Schneier.
 
-  */
 
- #include <assert.h>
 
- #include "ssh.h"
 
- typedef struct {
 
-     unsigned char i, j, s[256];
 
-     ssh_cipher ciph;
 
- } ArcfourContext;
 
- static void arcfour_block(void *handle, void *vblk, int len)
 
- {
 
-     unsigned char *blk = (unsigned char *)vblk;
 
-     ArcfourContext *ctx = (ArcfourContext *)handle;
 
-     unsigned k;
 
-     unsigned char tmp, i, j, *s;
 
-     s = ctx->s;
 
-     i = ctx->i; j = ctx->j;
 
-     for (k = 0; (int)k < len; k++) {
 
-         i  = (i + 1) & 0xff;
 
-         j  = (j + s[i]) & 0xff;
 
-         tmp = s[i]; s[i] = s[j]; s[j] = tmp;
 
-         blk[k] ^= s[(s[i]+s[j]) & 0xff];
 
-     }
 
-     ctx->i = i; ctx->j = j;
 
- }
 
- static void arcfour_setkey(ArcfourContext *ctx, unsigned char const *key,
 
-                            unsigned keybytes)
 
- {
 
-     unsigned char tmp, k[256], *s;
 
-     unsigned i, j;
 
-     s = ctx->s;
 
-     assert(keybytes <= 256);
 
-     ctx->i = ctx->j = 0;
 
-     for (i = 0; i < 256; i++) {
 
-         s[i] = i;
 
-         k[i] = key[i % keybytes];
 
-     }
 
-     j = 0;
 
-     for (i = 0; i < 256; i++) {
 
-         j = (j + s[i] + k[i]) & 0xff;
 
-         tmp = s[i]; s[i] = s[j]; s[j] = tmp;
 
-     }
 
- }
 
- /* -- Interface with PuTTY -- */
 
- /*
 
-  * We don't implement Arcfour in SSH-1 because it's utterly insecure in
 
-  * several ways.  See CERT Vulnerability Notes VU#25309, VU#665372,
 
-  * and VU#565052.
 
-  *
 
-  * We don't implement the "arcfour" algorithm in SSH-2 because it doesn't
 
-  * stir the cipher state before emitting keystream, and hence is likely
 
-  * to leak data about the key.
 
-  */
 
- static ssh_cipher *arcfour_new(const ssh_cipheralg *alg)
 
- {
 
-     ArcfourContext *ctx = snew(ArcfourContext);
 
-     ctx->ciph.vt = alg;
 
-     return &ctx->ciph;
 
- }
 
- static void arcfour_free(ssh_cipher *cipher)
 
- {
 
-     ArcfourContext *ctx = container_of(cipher, ArcfourContext, ciph);
 
-     smemclr(ctx, sizeof(*ctx));
 
-     sfree(ctx);
 
- }
 
- static void arcfour_stir(ArcfourContext *ctx)
 
- {
 
-     unsigned char *junk = snewn(1536, unsigned char);
 
-     memset(junk, 0, 1536);
 
-     arcfour_block(ctx, junk, 1536);
 
-     smemclr(junk, 1536);
 
-     sfree(junk);
 
- }
 
- static void arcfour_ssh2_setiv(ssh_cipher *cipher, const void *key)
 
- {
 
-     /* As a pure stream cipher, Arcfour has no IV separate from the key */
 
- }
 
- static void arcfour_ssh2_setkey(ssh_cipher *cipher, const void *key)
 
- {
 
-     ArcfourContext *ctx = container_of(cipher, ArcfourContext, ciph);
 
-     arcfour_setkey(ctx, key, ctx->ciph.vt->padded_keybytes);
 
-     arcfour_stir(ctx);
 
- }
 
- static void arcfour_ssh2_block(ssh_cipher *cipher, void *blk, int len)
 
- {
 
-     ArcfourContext *ctx = container_of(cipher, ArcfourContext, ciph);
 
-     arcfour_block(ctx, blk, len);
 
- }
 
- const ssh_cipheralg ssh_arcfour128_ssh2 = {
 
-     // WINSCP
 
-     /*.new =*/ arcfour_new,
 
-     /*.free =*/ arcfour_free,
 
-     /*.setiv =*/ arcfour_ssh2_setiv,
 
-     /*.setkey =*/ arcfour_ssh2_setkey,
 
-     /*.encrypt =*/ arcfour_ssh2_block,
 
-     /*.decrypt =*/ arcfour_ssh2_block,
 
-     NULL, NULL, // WINSCP
 
-     /*.next_message =*/ nullcipher_next_message,
 
-     /*.ssh2_id =*/ "arcfour128",
 
-     /*.blksize =*/ 1,
 
-     /*.real_keybits =*/ 128,
 
-     /*.padded_keybytes =*/ 16,
 
-     /*.flags =*/ 0,
 
-     /*.text_name =*/ "Arcfour-128",
 
-     NULL, NULL, // WINSCP
 
- };
 
- const ssh_cipheralg ssh_arcfour256_ssh2 = {
 
-     // WINSCP
 
-     /*.new =*/ arcfour_new,
 
-     /*.free =*/ arcfour_free,
 
-     /*.setiv =*/ arcfour_ssh2_setiv,
 
-     /*.setkey =*/ arcfour_ssh2_setkey,
 
-     /*.encrypt =*/ arcfour_ssh2_block,
 
-     /*.decrypt =*/ arcfour_ssh2_block,
 
-     NULL, NULL, // WINSCP
 
-     /*.next_message =*/ nullcipher_next_message,
 
-     /*.ssh2_id =*/ "arcfour256",
 
-     /*.blksize =*/ 1,
 
-     /*.real_keybits =*/ 256,
 
-     /*.padded_keybytes =*/ 32,
 
-     /*.flags =*/ 0,
 
-     /*.text_name =*/ "Arcfour-256",
 
-     NULL, NULL, // WINSCP
 
- };
 
- static const ssh_cipheralg *const arcfour_list[] = {
 
-     &ssh_arcfour256_ssh2,
 
-     &ssh_arcfour128_ssh2,
 
- };
 
- const ssh2_ciphers ssh2_arcfour = { lenof(arcfour_list), arcfour_list };
 
 
  |